Our specialist expertise enable us to forensically analyse computer systems and electronic devices for criminal investigations, data fraud analysis, finding hidden and deleted evidence, intellectual property that’s been compromised etc. We also assist representatives as appointed by the Honourable Court, to execute Anton Piller Orders in the seizure of electronic devices and computer data for the purpose of prosecution.Contact us for an estimate on our Computer Forensic Services once we’ve discussed your specific requirements. We’ll then explain the various processes we need to follow to conduct a Forensic Analysis.A BRIEF EXPLANATION OF OUR DIGITAL FORENSIC PROCEDURE•The first step is a brief by the client to discuss requirements to enable us to provide an estimate of timeframe and associated costs.•We start the Evidence Acquisition and Verification Process, this is to ensure the preservation of data integrity and includes a Forensically Sound Imaging Process of all electronic devices. As soon as electronic data will be used as possible evidence in any legal matter, data preservation is critical. Forensically sound and verified images are used for the analysis, therefore original electronic/storage media is never used for analysis to avoid contamination of possible evidence.•We proceed with an exhaustive Forensic Analysis following a proper Chain of Custody and documentation process.•We present our findings to the Client/Legal Counsel by means of a detailed Digital Forensic report that is concise and easy to follow.•Expert Witness Testimony when required.SOME OF THE COMPUTER FORENSIC REQUIREMENTS:•Hexadecimal searching for evidence and links to all areas of fraudulent activity.•Intellectual Property that may have been compromised incl. connected storage devices.•Examination of user activity, computer misuse/abuse at work, website visit logs, Internet cache examination.•Finding/recovering deleted data with relevant date & time stamps.•Examination of hidden Operating System logs, Registry & META file information.•Email searches, Data Recovery of deleted mail messages.•Data decryption, file repair and restoring password protected files.•Permanently erasing sensitive data for those organisations whose policies insist that sensitive data is destroyed irreversibly.

WHAT YOUSHOULD NOT DO

Please do not allow anyone to search or by any means work on any electronic device that may be used as evidence in any legal matter. This will contaminate evidence that could be used to support your case.By simply connecting a storage device to any computer, already makes a change to the storage volume information, date & time stamps etc.Users may unintentionally or inadvertently overwrite critical evidence by simply doing a search for information or continuing to access the electronic device in a normal working environment.Forensic experts use very advanced hexadecimal techniques to search for fragments of evidence that link to other deleted fragments all over the device that may be compromised when computer users access the device.BOTTOM LINE:Do not access the device if needed in any legal matter.Rather call us, even if it’s for advice only.

Our specialist expertise enable us to forensically analyse computer systems and electronic devices for criminal investigations, data fraud analysis, finding hidden and deleted evidence, intellectual property that’s been compromised etc. We also assist representatives as appointed by the Honourable Court, to execute Anton Piller Orders in the seizure of electronic devices and computer data for the purpose of prosecution.Contact us for an estimate on our Computer Forensic Services once we’ve discussed your specific requirements. We’ll then explain the various processes we need to follow to conduct a Forensic Analysis.A BRIEF EXPLANATION OF OUR DIGITAL FORENSIC PROCEDURE•The first step is a brief by the client to discuss requirements to enable us to provide an estimate of timeframe and associated costs.•We start the Evidence Acquisition and Verification Process, this is to ensure the preservation of data integrity and includes a Forensically Sound Imaging Process of all electronic devices. As soon as electronic data will be used as possible evidence in any legal matter, data preservation is critical. Forensically sound and verified images are used for the analysis, therefore original electronic/storage media is never used for analysis to avoid contamination of possible evidence.•We proceed with an exhaustive Forensic Analysis following a proper Chain of Custody and documentation process.•We present our findings to the Client/Legal Counsel by means of a detailed Digital Forensic report that is concise and easy to follow.•Expert Witness Testimony when required.SOME OF THE COMPUTER FORENSIC REQUIREMENTS:•Hexadecimal searching for evidence and links to all areas of fraudulent activity.•Intellectual Property that may have been compromised incl. connected storage devices.•Examination of user activity, computer misuse/abuse at work, website visit logs, Internet cache examination.•Finding/recovering deleted data with relevant date & time stamps.•Examination of hidden Operating System logs, Registry & META file information.•Email searches, Data Recovery of deleted mail messages.•Data decryption, file repair and restoring password protected files.•Permanently erasing sensitive data for those organisations whose policies insist that sensitive data is destroyed irreversibly.

WHAT YOUSHOULD NOT DO

Please do not allow anyone to search or by any means work on any electronic device that may be used as evidence in any legal matter. This will contaminate evidence that could be used to support your case.By simply connecting a storage device to any computer, already makes a change to the storage volume information, date & time stamps etc.Users may unintentionally or inadvertently overwrite critical evidence by simply doing a search for information or continuing to access the electronic device in a normal working environment.Forensic experts use very advanced h e x a d e c i m a l techniques to search for fragments of evidence that link to other deleted fragments all over the device that may be compromised when computer users access the device.BOTTOM LINE:Do not access the device if needed in any legal matter.Rather call us, even if it’s for advice only.